PyDFIR / pyDFIRRamLinks
PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and analysis of memory dumps, allowing users to focus on data rather than commands.
☆27Updated last year
Alternatives and similar repositories for pyDFIRRam
Users that are interested in pyDFIRRam are comparing it to the libraries listed below
Sorting:
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- DFIR project to collect and analyze events in Google Workspace☆13Updated last year
- ☆116Updated last month
- Repository of Yara Rules☆138Updated this week
- A repository of credential stealer formats☆238Updated 7 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆205Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- Shellcode loader based on indirect syscall☆22Updated 11 months ago
- Python tool to check rootkits in Windows kernel☆204Updated 5 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Retired TrustedSec Capabilities☆248Updated 2 weeks ago
- Web interface to explore Suricata EVE outputs☆84Updated this week
- ☆138Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆128Updated 3 months ago
- ☆24Updated 11 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆87Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆99Updated last week
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆146Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Updated 3 weeks ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆133Updated 5 months ago